Salt Typhoon forced a hard reckoning for telecommunications operators and defense-connected networks. At its core this campaign exposed a simple but brutal truth: when attackers gain durable access to provider edge infrastructure they can turn commercial plumbing into persistent global surveillance and a staging ground for further intrusions. The scale and patience of the activity elevated what had been a series of targeted probes into a systemic crisis for trust in carrier networks.
The technical pattern was not magic. Investigations and vendor telemetry show initial access commonly came through legitimate credentials and living-off-the-land techniques on network devices, with occasional exploitation of legacy features such as Cisco Smart Install (CVE-2018-0171) where exposed. Once inside, actors modified router configurations and used the network itself to mirror and tunnel traffic, harvest administrative secrets, and maintain persistence for months or years. Those tactics made detection difficult because the malicious activity blended with normal network management operations.
The operational consequences touched defense networks directly. A DHS memo and follow-on reporting documented long-running intrusions into a U.S. Army National Guard network, highlighting how supply-chain proximity between commercial telcos and state or local defense systems widens the attacker’s surface. That intrusion underlined the risk that compromising a provider can cascade into military and emergency response systems that rely on the same routing and management constructs.
Early public disclosures that major U.S. carriers were impacted crystallized the political stakes. Those disclosures also demonstrated an uncomfortable reality: carrier reassurances about containment are not the same as verifiable eradication or systemic remediation. The episode showed how hard it is to prove a negative across complex, federated networks and why independent, transparent validation and third-party forensics became necessary.
For defensive planners the lesson set is clear. Salt Typhoon was not only about one vulnerability or one vendor. It was a supply-chain and operational security problem with implications for network architecture, procurement, and national policy. Defense-affiliated networks that depend on commercial carriers must assume those carriers can be partially compromised and design accordingly.
Concrete lessons for telecom and defense operators
1) Treat provider-edge devices as crown jewels. Host, configuration, and management planes for provider-edge and customer-edge routers must be inventoried, monitored, and protected with the highest operational security standards. Inventory should include software versions, management interfaces, and all features that can be abused for remote configuration or traffic mirroring.
2) Reduce implicit trust in management protocols. TACACS+, RADIUS, SNMPv2 and other management telemetry carry secrets and are routinely mirrored inside networks. Encrypt and limit where possible, and move to stronger authentication such as certificate-based admin access and hardware-backed keys for device login. Enforce strict separation between management and production planes, including physical or logically separate out-of-band management networks.
3) Hunt for LOTL and configuration changes, not just malware. Because attackers used legitimate tooling and stolen credentials, defenders must elevate detection of anomalous configuration changes, unexpected GRE/IPsec tunnels, unauthorized SPAN/RSPAN/ERSPAN sessions, and unusual routing table updates. Immutable configuration baselines and secure change-control logging make this feasible. Continuous configuration integrity monitoring helps surface stealthy persistence.
4) Assume compromise and segment accordingly. Design architectures that limit blast radius if a provider element is breached. For defense and critical control traffic, require dedicated, encrypted control channels that do not traverse standard customer data paths. Apply micro-segmentation between business, operational technology, and control-plane functions. Where possible, provision alternative communication means for critical functions so they remain available if primary carrier infrastructure is suspect.
5) Harden procurement and supply chain reviews. The joint government advisories and follow-on analyses tied state-aligned activity to commercial tooling and service relationships. Buyers must expand supply-chain vetting to include operational telemetry, persistent access risk, and the potential for products or services to be repurposed for espionage. Contract language should require vendor transparency for firmware changes, access to device telemetry, and cooperation with authorized forensic reviews.
6) Raise the bar for lawful intercept features. The Salt Typhoon campaign reignited debate over lawful intercept architectures because the same mechanisms intended for authorized collection can be abused. Operators and policymakers should jointly re-engineer intercept capabilities to minimize persistent privileged access and require stronger mutual authentication, auditable access, and compartmentalization so interception capabilities cannot be co-opted at scale.
7) Improve cross-sector incident validation and transparent third-party forensics. Carrier claims that their networks are “clear” are necessary but insufficient. Independent validation frameworks and certified forensic providers should be used during large-scale incidents to restore confidence for downstream customers including government and defense agencies. Government-industry playbooks must standardize evidence collection, disclosure thresholds, and criteria for public reporting.
Tactical controls operators can implement now
- Enforce two-person approval and signed config-change workflows for high-impact routers.
- Restrict Smart Install and similar legacy management features to isolated management VLANs or disable them entirely.
- Centralize logging of device syslogs and configuration snapshots to a tamper-evident store; perform regular integrity checks.
- Enforce short-lived admin credentials and hardware MFA for device consoles and API access.
- Detect and alert on new mirror sessions, new GRE/IPsec tunnels, or abnormal increases in mirrored traffic.
- Use deception on management planes to detect credential reuse and credential-based pivoting.
Policy and defense posture recommendations
- Mandate critical-infrastructure reporting and a validated forensic standard for incidents impacting more than a de minimis set of customers or government partners.
- Fund resilient, alternative communications channels for defense and emergency services that do not rely solely on public carrier control planes.
- Update procurement rules to require vendor attestation for supply chain risk and to permit periodic independent audits of device firmware and management telemetry.
- Coordinate internationally on sanctions and diplomatic responses where commercial entities are proven to enable state-linked espionage. Joint advisory mechanisms and multinational information sharing were decisive in exposing the campaign; extend and normalize those channels.
A final note for defenders and engineers
Salt Typhoon was a reminder that modern conflict is not confined to kinetic battlefields. Adversaries that can convert carrier networks into surveillance grids gain both intelligence and leverage. For systems that cross the cyber and physical divide, such as drone command and control, the stakes are existential. Segregating control channels, enforcing end-to-end cryptographic integrity for command links, and validating the provenance of update images are not optional. They are mission-critical.
The practical takeaway is straightforward. Invest in hardening the network management plane, assume compromise, and design to limit what an intruder can see and do if they get in. That is how telecom operators and defense networks will stop allowing infrastructure to be weaponized, and how they will start restoring the trust that Salt Typhoon shook loose.